Unauthorized access : the crisis in online privacy and security / Robert H. Sloan and Richard Warner.

Sloan, Robert H.
Boca Raton, FL : CRC Press, Taylor & Francis Group, [2014];©2014
Added to CLICnet on 06/27/2014


Check CLICnet for availability
Notes:

  • A Chapman & Hall book –Title page.
  • Includes bibliographical references and index.
  • Introduction — An Explanation of the Internet, Computers, and Data Mining — Norms and Markets — Informational Privacy: The General Theory — Informational Privacy: Norms and Value Optimality — Software Vulnerabilities and the Low-Priced Software Norm — Software Vulnerabilities: Creating Best Practices — Computers and Networks: Attack and Defense — Malware, Norms, and ISPs — Malware: Creating a Best Practices Norm — Tracking, Contracting, and Behavioral Advertising — From One-Sided Chicken to Value Optimal Norms.
  • Going beyond current books on privacy and security, Unauthorized Access: The Crisis in Online Privacy and Security proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, the book explains complicated concepts in clear, straightforward language. The authors–two renowned experts on computer security and law–explore the well-established connection between social norms, privacy, security, and technological structure. This approach is the key to understanding information security and informational privacy, providing a practical framework to address ethical and legal issues. The authors also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security. Bridging the gap among computer scientists, economists, lawyers, and public policy makers, this book provides technically and legally sound public policy guidance about online privacy and security. It emphasizes the need to make trade-offs among the complex concerns that arise in the context of online privacy and security. — Publisher’s description.

Subjects:

Requested by Steinmetz, E

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>